This user is listed as a non-competitor.
Module 0: Windows Binaries, 0 / 50 (0%)
Module 1: Dynamic Analysis, 0 / 110 (0%)
Module 2: Tools Arsenal, 92 / 309 (30%)
29.773462783172% complete
Module 3: Packers & Obfuscators, 0 / 519 (0%)
Module 4: Reverse Engineering, 0 / 708 (0%)
Module 5: Aniti-Malware Tricks, 0 / 507 (0%)
Module 6: Process Injection, 400 / 500 (80%)
Module 7: .NET Reversing, 0 / 900 (0%)
Module 8: Dissecting Infostealers like a BOSS, 0 / 903 (0%)
Module 9: Fighting Ransomware, 0 / 880 (0%)
Total: 492 / 5,386 (9.1%)
Challenge |
Solved |
Points |
Class 5.1 (Lab): Fakenet 101
(Module 2: Tools Arsenal)
|
#5,
3 months, 27 days after release (2025-08-30 16:22:51)
|
46 |
Class 5 (Lab): Wireshark 101
(Module 2: Tools Arsenal)
|
#6,
3 months, 28 days after release (2025-08-30 16:17:43)
|
46 |
Class 4 (Chall): Find the Shellcode
(Module 6: Process Injection)
|
1 month, 25 days after release (2025-08-21 19:48:10)
|
95 |
Class 3 (Chall): Find the Window
(Module 6: Process Injection)
|
1 month, 25 days after release (2025-08-21 19:46:47)
|
80 |
Class 2.1 (Lab): SetThreadContext Technique
(Module 6: Process Injection)
|
1 year, 3 months after release (2025-08-21 19:46:31)
|
75 |
Class 2 (Lab): SetThreadContext Technique
(Module 6: Process Injection)
|
1 year, 3 months after release (2025-08-21 19:46:17)
|
75 |
Class 1 (Lab): CreateRemoteThread Technique
(Module 6: Process Injection)
|
#4,
1 year, 3 months after release (2025-08-21 19:46:03)
|
75 |